What is
Encryption
Encryption is the process of changing intelligible data into
unintelligible data. Decryption is the opposite of
encryption it decrypt the encrypted data into intelligible
data.

2.

XOR
Encryption
The simplest stream cipher is called the Vernam cipher or
XOR Encryption. A bit from a key is added, with the carry
discarded, to a bit from the plaintext to yield one bit of
cipher text (this operation is called exclusive -OR).

3.

Transposition Encryption
Transposition ciphers are based on the rearrangement of each
character in the plain text message to prpduce a cipher
text, These encryption technique include reversing the
entire message, reforming the message into a geometrical
shape, rearranging the plain text by scrambiling a sequence
of columns, and periodically permuting the character of the
plain text.

4.

Symmetric or Secret Key Encryption
In this type of encryption both the sender and recipient
posses the same key, to encrypt and decrypt the data, for
successful operation both parties must agree upon a shared
secret key.

5.

Asymmetric Encryption
Asymmetric Encryption is a form of Encryption where keys
come in pairs. What one key encrypts, only the other can
decrypt.

6.

Certificate Authority
Certification authority (CA) is an entity which issues
digital certificates for use by other parties. It is an
example of a trusted third party.

7.

Decryption Logics
There is no predefined formula for find the secret key. It
is an art and normally known as cryptography or reverse
engineering.

What is SQL
Injection
SQL Injection the most popular method to pass SQL command
deliberately from input filed in application.

2.

SQL
Injection by example
SQL injection is a type of security exploit in which the
attacker adds SQL statements through a web application's
input fields or hidden parameters to gain access to
resources or make changes to data.

3.

Advanced SQL Injection
SQL Injection is the hacking technique which attempts to
pass SQL commands (statements) through a web application for
execution by the backend database.

Password Recovery

1.

Cracking of
Secret keys
Cryptanalysis has long relied on the lengthy, patient
applications of trail and error in order to crack a code.
The advent of electronic computing both hardware means high
processor speed, high memory and software means multi
tasking, multi processing software platform dramatically
enhanced that process.

2.

Brute Force Cracking of Passwords
Brute force technique is very simple and efficient,
basically it try out all possible combination of password by
given character set. The developer of such program admitted
that the software includes artificial delays to make the
cracking appear to take longer than it really does. because
some commercial application have restricted by numbers of
attempt for password guising and automatically lock the
system for preventing hack.

Tips for
success in technical interview
This is the collection of Interview Question, I collected
form different source, I try to give answer of all questions,
if you are not satisfied or you think answers are not correct
you can post your comment for that, I also appreciate you if
you submit interview question and share your interview
experience.

MCP eBooks
The Microsoft Certified Professional (MCP) program consist
several papers, for preparing each paper you need to study
the books, here I give you the source of Microsoft Press
books. You can purchase MCP books from following sites or
you can download the free eBook from following links. I
provide links for following paper (70-305, 70-306, 70-228,
70-229, 70-300, 70-310, 70-290) which I have read to pass my
MCP, MCAD, MCSD, MCDBA Certification. This books are most
comprehensive books and specially made for clear the
certification and covering all aspect of examination.

2.

MCP
Test Simulators
Download this free Microsoft Certification Examination
Simulator with actual question and answer for practice. Test
engine can simulate real examination environment. It will
help you to prepare for the examination MCP (Microsoft
Certified Professional), MCAD (Microsoft Certified
Application Developer), MCSD (Microsoft Certified Solution
Developer) and MCDBA (Microsoft Certified Database
Administrator). This engine have two part one is the core
engine and databank. You must download the engine first and
download the databank as per your requirement of MCP Paper.